International Conference on Information, Communications and Signal Processing最新文献

筛选
英文 中文
Differentially Private Frequent Itemset Mining Against Incremental Updates 针对增量更新的差分私有频繁项集挖掘
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_38
Wenjuan Liang, Hong Chen, Yuncheng Wu, Cuiping Li
{"title":"Differentially Private Frequent Itemset Mining Against Incremental Updates","authors":"Wenjuan Liang, Hong Chen, Yuncheng Wu, Cuiping Li","doi":"10.1007/978-3-030-41579-2_38","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_38","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129350477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially Private Reinforcement Learning 差异化私有强化学习
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_39
Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, X. Zou, Tao Yang
{"title":"Differentially Private Reinforcement Learning","authors":"Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, X. Zou, Tao Yang","doi":"10.1007/978-3-030-41579-2_39","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_39","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems 自我主权身份系统中保护隐私的eID派生
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_18
Andreas Abraham, Felix Hörandner, O. Omolola, Sebastian Ramacher
{"title":"Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems","authors":"Andreas Abraham, Felix Hörandner, O. Omolola, Sebastian Ramacher","doi":"10.1007/978-3-030-41579-2_18","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_18","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Character-Level BiGRU-Attention for Phishing Classification 字符级的网络钓鱼分类BiGRU-Attention
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_43
L. Yuan, Zhiyong Zeng, Yikang Lu, Xiaofeng Ou, Tao Feng
{"title":"A Character-Level BiGRU-Attention for Phishing Classification","authors":"L. Yuan, Zhiyong Zeng, Yikang Lu, Xiaofeng Ou, Tao Feng","doi":"10.1007/978-3-030-41579-2_43","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_43","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Blockchain-enabled Searchable Encryption 走向支持区块链的可搜索加密
International Conference on Information, Communications and Signal Processing Pub Date : 2019-08-26 DOI: 10.1007/978-3-030-41579-2_28
Qiang Tang
{"title":"Towards Blockchain-enabled Searchable Encryption","authors":"Qiang Tang","doi":"10.1007/978-3-030-41579-2_28","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_28","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114123535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons 公开可验证的静态存储证明:一种新方案和效率比较
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_27
Henning Kopp, F. Kargl, Christoph Bösch
{"title":"Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons","authors":"Henning Kopp, F. Kargl, Christoph Bösch","doi":"10.1007/978-3-030-01950-1_27","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_27","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets 用三子集自动搜索具有除法性质的ARX分组密码积分的方法
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_38
Yang Han, Yongqiang Li, Mingsheng Wang
{"title":"Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets","authors":"Yang Han, Yongqiang Li, Mingsheng Wang","doi":"10.1007/978-3-030-01950-1_38","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_38","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation 利用验证者本地撤销实现基于格的组签名的完全安全性
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_17
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
{"title":"Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation","authors":"Maharage Nisansala Sevwandi Perera, Takeshi Koshiba","doi":"10.1007/978-3-030-01950-1_17","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_17","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters 云数据中心中主机的动态权限管理机制
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_43
L. Wang, Min Zhu, Qing Li, Bibo Tu
{"title":"Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters","authors":"L. Wang, Min Zhu, Qing Li, Bibo Tu","doi":"10.1007/978-3-030-01950-1_43","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_43","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123679411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains lagprobe:利用不存在域的查询时滞检测基于dga的恶意软件
International Conference on Information, Communications and Signal Processing Pub Date : 2018-10-29 DOI: 10.1007/978-3-030-01950-1_3
Xi Luo, Liming Wang, Zhen Xu, W. An
{"title":"LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains","authors":"Xi Luo, Liming Wang, Zhen Xu, W. An","doi":"10.1007/978-3-030-01950-1_3","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_3","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125632019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信